[go: up one dir, main page]

Udayakumar, 2023 - Google Patents

Design and deploy security for infrastructure, data, and applications

Udayakumar, 2023

Document ID
9986004318002921519
Author
Udayakumar P
Publication year
Publication venue
Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services

External Links

Snippet

Cybersecurity is essential in protecting systems from malicious attacks and unauthorized access. It also helps to ensure that data is kept safe and secure and that applications remain available and reliable. Without proper cybersecurity measures in place, organizations can …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
Akhtar et al. A comprehensive overview of privacy and data security for cloud storage
Borky et al. Protecting information with cybersecurity
Subashini et al. A survey on security issues in service delivery models of cloud computing
Mather et al. Cloud security and privacy: an enterprise perspective on risks and compliance
Fernandes et al. Security issues in cloud environments: a survey
US20240364689A1 (en) Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty Requirements
TAMER Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Roy et al. A study on google cloud platform (gcp) and its security
Soares et al. Cloud security: state of the art
Gurkok Securing cloud computing systems
Diogenes et al. Microsoft Azure security center
Bulusu et al. A study on cloud computing security challenges
Sailakshmi Analysis of cloud security controls in aws, azure, and google cloud
Ali et al. Emerging trends in cloud computing paradigm: An extensive literature review on cloud security, service models, and practical suggestions
Udayakumar Design and deploy security for infrastructure, data, and applications
Agrawal et al. Cloud Computing Security: Strategies and Best Practices
Lawrence et al. Securing Kubernetes: A study on the measures for enhancing control and data plane security
WO2024227197A1 (en) Accessing cloud environments through administrative tenancies to comply with sovereignty requirements
Udayakumar Design and Deploy a Secure Azure Environment
Yadav et al. A comprehensive survey of IoT-based cloud computing cyber security
Deshpande et al. Optimization of security as an enabler for cloud services and applications
Sandbu Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender
Nahar et al. Cloud computing and cloud security
Pidlubnyi Increasing Security and Reducing Risks Running Services in a Potential Containerized Environment While Meeting Regulatory Standards